msedgeupdate_unsigned.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b3aa433a00e332af002f38985cdc541df744bc59ddd32125a65dcbe202e2215a.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b3aa433a00e332af002f38985cdc541df744bc59ddd32125a65dcbe202e2215a.dll
Resource
win10v2004-20240802-en
General
-
Target
b3aa433a00e332af002f38985cdc541df744bc59ddd32125a65dcbe202e2215a
-
Size
2.0MB
-
MD5
6d4928837d2df90e789c86c3bc837d33
-
SHA1
f91259d4abbcf0e6fef3b90ea4932712279ad349
-
SHA256
b3aa433a00e332af002f38985cdc541df744bc59ddd32125a65dcbe202e2215a
-
SHA512
b41fb2d00b8e246bd0bf76eaf5bbe5c5086d9bd34bdfe856ac7506004f3ac7d2b748ac0577effdaf54c016b0d8a34edf3adf7540ad8a558f191d0f2c91eb71e4
-
SSDEEP
49152:+vJhItDagEP76mClLngaLa7uclNX7VW2UECL7LaEZ:yhIt25P7ClL1uxW2N0Z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b3aa433a00e332af002f38985cdc541df744bc59ddd32125a65dcbe202e2215a
Files
-
b3aa433a00e332af002f38985cdc541df744bc59ddd32125a65dcbe202e2215a.dll windows:5 windows x86 arch:x86
f488c196831b4696983c5a865aea58c5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
SizeofResource
HeapFree
InitializeCriticalSectionAndSpinCount
HeapSize
GetLastError
LockResource
HeapReAlloc
RaiseException
FindResourceExW
LoadResource
FindResourceW
HeapAlloc
DecodePointer
HeapDestroy
DeleteCriticalSection
GetProcessHeap
ReleaseSemaphore
DeleteTimerQueueTimer
CreateTimerQueueTimer
FreeLibraryAndExitThread
ExitThread
lstrlenW
WriteFile
GetShortPathNameW
GetPrivateProfileIntW
OutputDebugStringA
SetFilePointer
WaitForSingleObject
CreateFileW
GetCurrentThreadId
ReleaseMutex
Sleep
GetFileInformationByHandle
OutputDebugStringW
CloseHandle
GetLocalTime
GetCurrentProcessId
lstrcmpiW
lstrcmpW
CreateDirectoryW
FindFirstFileW
SetLastError
FindNextFileW
GetCurrentProcess
ExpandEnvironmentStringsW
RemoveDirectoryW
WaitForMultipleObjects
GetEnvironmentVariableW
FindClose
GetFileAttributesW
DuplicateHandle
FormatMessageW
GetCurrentThread
DeleteFileW
LoadLibraryW
GetCurrentDirectoryW
GetProcAddress
LocalFree
GetModuleHandleW
FreeLibrary
GetTempFileNameW
OpenMutexW
GetTickCount
LoadLibraryExW
GetExitCodeProcess
ReadFile
CompareFileTime
SetEndOfFile
FindFirstChangeNotificationW
SetFileAttributesW
MultiByteToWideChar
GetFileAttributesExW
FileTimeToSystemTime
FindCloseChangeNotification
FindNextChangeNotification
MoveFileExW
GetFileSize
CopyFileW
GetSystemTimeAsFileTime
FlushFileBuffers
lstrcpynW
ExitProcess
IsDebuggerPresent
WideCharToMultiByte
GetTimeZoneInformation
FileTimeToLocalFileTime
SystemTimeToFileTime
SystemTimeToTzSpecificLocalTime
GetStringTypeExW
GetModuleFileNameW
GetTempPathW
GetSystemDirectoryW
GetWindowsDirectoryW
VirtualQuery
GetModuleHandleExW
TryEnterCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
CreateMutexW
CreateEventW
SetEvent
ResetEvent
GetProductInfo
GetVersionExW
VerSetConditionMask
VerifyVersionInfoW
IsWow64Process
GetLongPathNameW
LocalAlloc
OpenProcess
HeapSetInformation
SetPriorityClass
TerminateProcess
K32GetModuleFileNameExW
WaitForMultipleObjectsEx
K32GetProcessImageFileNameW
CreateToolhelp32Snapshot
ProcessIdToSessionId
Process32NextW
WaitForSingleObjectEx
Process32FirstW
K32EnumProcesses
ReadProcessMemory
K32EnumProcessModules
SetHandleInformation
DeviceIoControl
CreatePipe
SetErrorMode
GetSystemPowerStatus
GetDiskFreeSpaceExW
GlobalMemoryStatusEx
CreateProcessW
SetProcessWorkingSetSize
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
GetStdHandle
QueryDosDeviceW
GetLogicalDriveStringsW
InitOnceExecuteOnce
GetComputerNameExW
SetEnvironmentVariableW
OpenEventW
GetPrivateProfileStringW
CreateThread
SetCurrentDirectoryW
GetPriorityClass
OpenThread
QueryPerformanceCounter
GetCommandLineW
CreateHardLinkW
GetThreadLocale
lstrcmpA
QueueUserWorkItem
GetTickCount64
GetStringTypeExA
SetFilePointerEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
InitializeSListHead
GetStringTypeW
InitializeCriticalSectionEx
EncodePointer
LCMapStringEx
CompareStringEx
GetCPInfo
GetLocaleInfoEx
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemInfo
VirtualAlloc
VirtualProtect
GetFileType
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetFileSizeEx
SetStdHandle
GetConsoleOutputCP
GetConsoleMode
ReadConsoleW
WriteConsoleW
LoadLibraryExA
GetProcessShutdownParameters
SetProcessShutdownParameters
GetProcessId
Thread32Next
Thread32First
RegisterWaitForSingleObject
UnregisterWaitEx
QueryPerformanceFrequency
GetDriveTypeW
GetUserDefaultLangID
GetSystemDefaultLangID
QueryUnbiasedInterruptTime
GetProcessTimes
DeleteTimerQueueEx
CreateTimerQueue
QueryFullProcessImageNameW
GetNativeSystemInfo
GetModuleFileNameA
GlobalHandle
MulDiv
FreeResource
InterlockedPopEntrySList
FlushInstructionCache
VirtualFree
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
SwitchToThread
GetExitCodeThread
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableCS
SleepConditionVariableSRW
netapi32
NetApiBufferFree
NetGetJoinInformation
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
wtsapi32
WTSQuerySessionInformationW
WTSEnumerateSessionsW
WTSFreeMemory
Exports
Exports
DllEntry
Sections
.text Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 448KB - Virtual size: 447KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.didat Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 207KB - Virtual size: 206KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ